Tag Archive for Business

Data Breach Hits Internet Archive Users

Updated—10/21/2024—The Verge reports that the Internet Archive is under the influence of attackers.  Despite being back online in Read Only mode, it seems the attackers control the IA help desk.  According to reports, the attackers have a Zendesk token and can intercept tickets.

Updated – 10/16/2024 – TechRadar reports that the attack used two attack vectors: TCP reset floods and HTTPS application layer attacks.  The TCP flood will flood a victim with vast numbers of Transmission Control Protocol (TCP) reset packets, which trick a computer into terminating its connection with others in its network.  An HTTPS application layer attack will typically aim to overwhelm servers by targeting the application layer to disrupt the normal traffic flow, rendering regular services unavailable.

Data Breach Hits Internet Archive UsersThe non-profit Internet Archive has been offline since Tuesday (10/09/2024).  Founded in 1996, the Internet Archive digital library provides “universal access to all knowledge.” Through the Wayback Machine, it preserves billions of webpages, texts, audio recordings, videos, and software applications.

Internet Archive founder Brewster Kahle posted on X (formerly Twitter) that the site was under a DDoS attack.

Internet Archive under DDOS attack

Later on Tuesday, the attack evolved.  The site started displaying a hacker pop-up notification.  After closing the message, the site loaded typically but very slowly.  The pop-up said:

JavaScript pop-up message claiming that the Internet Archive had been hacked

“Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach?  It just happened.  See 31 million of you on HIBP!”


HIBP refers to Have I Been Pwned?, a website where people can check to see if their information has leaked from cyber attacks.

Finally, the pop-up was gone, along with the rest of the site, leaving only a placeholder message saying:

“Internet Archive services are temporarily offline.”

Stolen Internet Archive data

Stolen Internet Archive dataOn September 28, 2024, attackers stole the site’s user authentication database with 31 million unique records.  Bleeping Computer confirmed that Have I Been Pwned had received an “ia_users.sql” database file containing authentication information for registered members, including their email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data.

Who is responsible

Who is responsibleThe hacktivist group SN_BlackMeta, which emerged in November 2023, claimed responsibility for the DDoS attack.  Cybersecurity firm Radware connected SN_BlackMeta to a pro-Palestinian hacktivist movement that utilizes DDoS-for-hire services like InfraShutdown.  SN_BlackMeta has launched other cyberattacks, including a record-breaking DDoS attack against a Middle Eastern financial institution.

It’s unclear if they are involved in the Internet Archive data breach.  The group said that it carried out the DDoS attack because the United States supports Israel and that the Internet Archive “belongs to the USA.”

Many social media users quickly pointed out that the Internet Archive is an independent non-profit organization not affiliated with the U.S. government.

Internet Archive Back online – sorta

10/14/2024, it is back in a limited read-only way

Internet Archive back online read only

rb-

Finally, what do you need to do if you have an account at the Internet Archive?

A compromised password is always a concern in any breach.  But in this case, the passwords were salted and hashed, making them difficult to crack through reverse engineering or brute force.  Still, once the Internet Archive returns, you should change your password to be safe.

Related article

 

Ralph Bach has been in I.T. for a while and has blogged from the Bach Seat about I.T., careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Passkeys: The Future of Online Security

Passkeys: The Future of Online SecurityI have been writing about the impact of bad passwords since 2010. One of the most appalling bad password statistics comes from the Identity Theft Resource Center (ITRC). They have tracked over 1 billion data breach victims in the first half of 2024. Enough is enough, there is finally a workable answer to passwords: passkeys.

Passkeys were developed by the Fast Identity Online (FIDO) Alliance to log in to apps and websites without using a username and password combination. Instead, a passkey uses a pair of cryptographic keys generated by your device to unlock your account. Google and Apple will store your unique public key. Your private key is only stored on your device, and after your device authenticates your identity, the two keys combine to grant you access to your account.

According to FIDO research, 38% of consumers (PDF) are not familiar with passkey technology. A significant percentage of users do not understand passkeys, let alone trust them to protect their data and identities.

How passkeys work: A step-by-step guide

passkeys utilize public-key cryptography.Unlike traditional passwords, passkeys utilize public-key cryptography. That means every passkey has two parts: a public key and a private key. Together, they keep your accounts secure by allowing websites and apps to check that you are who you say you are. Here’s an overview of the passkey process:

  1. Creation: When you create a passkey, your device generates a pair of cryptographic keys – a public key and a private key.
  2. Storage: Apps or websites store your unique public key, while your private key is only stored on your device. After your device authenticates your identity, the two keys combine to grant you access to your account.
  3. Authentication: When you log in, the app or website sends a challenge to your device. Your device uses the private key to sign this challenge, proving your identity without revealing the private key.
  4. Verification: The app or website verifies the signed challenge using the public key. If it matches, you’re granted access.

The benefits of passkeys:

  • The benefits of passkeysStrong by default: You don’t have to create anything manually or worry about whether your private key is long or random enough.
  • No Need to Remember: You only need to authenticate with biometrics (or your device passcode) to sign in to your account.
  • Private Keys Are Never Shared: You don’t have to worry about how the website is storing your credentials.
  • Public Keys Can’t Be Used to Figure Out Your Private Key: If a criminal breaches a website’s servers, the best they can hope to find is your public key. The public key cannot be used to sign in to your account. Nor can it be reverse engineered to reveal your private key.
  • Strong Defense Against Malware: Criminals often create fake but seemingly authentic websites to trick you into sharing your login details.
  • Protection Against Ransomware: Many ransomware attacks start with social engineering emails. Once in, they continue by installing keystroke sniffing software that can watch people enter their IDs and passwords.
  • Improved User Experience: Signing in with a passkey is more convenient, faster, and smoother than using traditional passwords.

Why you should use a passkey instead of a password

Securing your online accounts is more important than ever in today’s digital age. Traditional passwords have been the go-to method for authentication for decades, but they come with several drawbacks. Here’s why you should consider using passkeys instead of passwords:

  • Enhanced Security: Passkeys use public-key cryptography, which involves a pair of cryptographic keys: a public key and a private key.
  • Convenience and Ease of Use: Remembering multiple complex passwords can be a hassle.
  • Protection Against Phishing: Phishing attacks are a common method used by cybercriminals to steal passwords.
  • Reduced Risk of Data Breaches: Data breaches often result in the exposure of millions of passwords.
  • Seamless Cross-Platform Experience: Passkeys are designed to work seamlessly across different devices and platforms.
  • Future-Proof Technology: As technology evolves, so do the methods used by cybercriminals.

Some consumers still don’t trust this form of security because they assume that anyone stealing their phone could log into their accounts. This isn’t true, as the criminal would still need your face, fingers, or eyes.

rb-

Even if you don’t fully trust passkeys, you should distrust your passwords more. It’s likely that your credentials have already been stolen and are on the dark web.

There is wide consensus in the tech community that passwords are an unsustainable security framework. Even password managers that let you use one strong master password could be at risk. First, some of them have been hacked and then there is the risk that those protected passwords are no longer secure.

A reasonable answer

A passwordless system is the only reasonable answer.

There is not a single passkey to solve all problems. You will have different passkeys for different systems and platforms.

However, this doesn’t really matter. The signup for passkeys is easy and consistent on all platforms in that there will never be a password attached to it. It will use the same biometrics you use for your other platforms, services, and their respective passkeys. In other words, it can feel like it’s one passkey for all online systems.

While passwords have served us well for decades, it’s time to embrace a more secure and convenient alternative. Passkeys offer enhanced security, ease of use, and protection against phishing and data breaches. By making the switch to passkeys, you can enjoy a safer and more seamless online experience. It’s true that the industry is still doing a poor job of explaining why you should embrace passkeys, you should like it because passkeys will ultimately save your data and digital identity.

Are you ready to make the switch to passkeys? Let us know your thoughts!

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Secure Your Printer: Protect Personal Data from Hackers

Secure Your Printer: Protect Personal Data from HackersDid you know your printer could be a gateway for hackers to access your data? I have been writing about safeguarding personal data since 2005. By now, everyone should know how to protect personal data on computers and phones—meticulously encrypting emails, using passkeys, and regularly updating software. Despite the hard work, one vulnerability often gets overlooked: the printer. Figuring out how to dispose of a printer safely can make or break online security.

New revelations about certain printers recently highlighted the unforeseen security risks lurking in our offices and homes.  However, with the following tech tips from cybersecurity experts, you can combat the unexpected threat found in many printers and fortify your data against hackers.

Why Printers Pose a Security Risk

Any digital device that connects to Wi-Fi, including printers, stores data about the network on its hard drive.  This is usually beneficial since it allows the printer to automatically connect to the network without requiring you to re-enter the information every time. However, Chris Pierson, CEO of the cybersecurity company BlackCloak, warns that when you sell or recycle a printer, you should delete this saved data by performing a memory wipe or factory reset. The reset prevents cybercriminals from discovering and exploiting the information on the printer.

There’s just one problem: Canon has announced a security flaw in several printers. The security flaw leaves behind the stored Wi-Fi information even after the reset process.  If a hacker gains access to the printer after you sell it or throw it away, they could find these wireless settings simply by going to the Wi-Fi option in the main menu.  Canon reports that this issue affects several printer models, including the E, G, GX, iB, iP, MB, MG, MX, PRO, TR, TS, and XK series.

What information is at risk?

Printers store data about the network on it's hard drive.Data about your wireless settings—including your Wi-Fi name, Internet Protocol address, and network password—could all stick around even after resetting your Canon printer.  Once hackers find that information through the menu commands, they could easily log in to the Wi-Fi network and spy on your online activity, including sensitive information like your bank account login, credit card numbers, and personal photos.

Is this a problem with all printers?

BlackCloak CEO Pierson says the current notice is specific to Canon’s printers and “serves as a reminder [of the risks] to everyone with any electronic device that connects to a … network.” That includes other Wi-Fi connected printers and smart devices like Ring doorbells, refrigerators, dryers, and light bulbs.

You might be surprised by all the devices in your house that access and store your Wi-Fi settings—and consequently might leave your data vulnerable.  “Wi-Fi-connected devices have proliferated, and [they include] things that we may not think of,” says Alex Hamerstone, a director at security consulting firm TrustedSec.  “A lot of low-priced consumer electronics from previously unknown manufacturers have Wi-Fi access now, and I would be more worried about those.”

Steps to Safely Dispose of Printers

Before you throw away, donate, or even send your printer in for repair, you should always perform a factory reset to erase all stored informationThe specific steps for a factory reset will vary depending on your printer model.  Still, the reset function resides under the “General” or “Setup” setting in the main menu.

Canon printers

For Canon printers, follow these steps for a factory reset:

  1. Canon printersGo to the Setup option in the main menu.
  2. Select Device settings > OK, then select Reset settings > OK.
  3. Find Reset, then choose OK.
  4. Select Yes to restore the printer to factory settings.

In addition, users with one of the affected Canon printers must follow these additional steps to remove their Wi-Fi data.

  1. In the menu, go to Reset Settings> Reset All.
  2. Enable the wireless LAN.
  3. Follow the first step again: Reset settings > Reset all.

If you have a Canon printer model that does not have the “Reset all settings” function, do this instead:

  1. Select Reset LAN settings.
  2. Enable the wireless LAN.
  3. Select Reset LAN settings one more time.

HP printers

For HP LaserJet Pro 4001n printers, follow these steps from HP for a factory reset:

  1. HP printersTurn Off the Printer: Turn the printer completely turned off.
  2. Turn On the Printer: Turn the printer back on and wait for the HP logo to appear on the screen.
  3. Access the Preboot Menu: As soon as the HP logo appears, press and hold the “Cancel” button (usually marked with an “X”) until the “Preboot” menu appears on the display.
  4. Navigate to Administrator Settings: Use the arrow buttons to navigate to “Administrator” and press the “OK” button.
  5. Restore Factory Settings: In the “Administrator” menu, find and select “Restore Factory Settings.” Confirm your choice when prompted.  The printer will begin restoring factory settings.
  6. Wait for the Process to Complete: The printer will restart during this process.  Wait until it fully restarts and displays the home screen.

Additional Tips for Printer Security

  • Disable or limit the printer’s network connectivity, such as Wi-Fi, Bluetooth, or cloud services, if you don’t use them.
  • You can also turn off the printer’s memory or hard drive to erase your data after printing.
  • Enable the printer’s password, PIN, or biometric authentication to prevent anyone from accessing its data without permission.
  • Keep your printer’s software up to date.  Patches will close any security vulnerabilities that hackers could exploit.
  • Avoid connecting your printer to public Wi-Fi, which could make it vulnerable to spyware and other security risks.

rb-

Ensuring the security of your personal data extends beyond computers and smartphones to include often-overlooked devices like printers. Following the steps outlined in this article, you can effectively decommission your printer and protect sensitive information from potential cyber threats. Stay vigilant, keep your devices updated, and always perform a factory reset before disposing of any electronic device. Secure your printer today to safeguard your data and maintain your online privacy.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Job Scams That Will Compromise Your Safety

Job Scams That Will Compromise Your SafetyJob scams are on the rise. NBC reports that they increased by 118% from 2022. Job scams are essentially fake job postings. The scammer is trying to access your bank account and looking for your personal information. The rise in remote work and advancements in AI have made it easier for scammers to create convincing fake job listings.

Mark Anthony Dyson has written an interesting article on the Job Scam Report about conducting a safe job search. He warns that job scammers are hijacking the hiring process to steal personal information in the long run. However, they are also after cash in the short run. According to the FTC, the typical job scam victim in 2023 lost $2,000. Additionally, the article details five myths about job scams that are putting job seekers at risk.

Your future

Dyson says that bad guys are running scams to compromise personal info. The Better Business Bureau reports that employment scams were the number one riskiest scam for people ages 18-44 in 2023. Consequently, if scammers get hold of data, your future financial and employment will be adversely affected. 

He points out that most scams are just old scams with new layers and better disguises. They use basic social engineering tactics, like phishing links, infected files, and fake landing pages. We’ve known about all of these tactics for decades.

Dyson says some job seekers let their guard down, and others give up on their job search. However, this critical error in judgment makes everyone more vulnerable to job scam myths like:

Job scams ONLY target the desperate.

Scammers use social engineering to cast a wide net.False: Scammers use social engineering to cast a wide net. They want to find anyone looking for something better. They create offers that are “too good to be true” and uniquely plausible. The “offers” are designed to pique the interest of the receiver. The BBB warns that if you are offered a job without a formal interview with excellent pay and benefits, it’s likely a scam.

How to stay safe: Don’t entertain the possibilities unless you know who sent it to you. One way to verify the sender is to search for the number quickly in Google. If the number is associated with a legitimate business, you should see that the business’s website appears in the first few results. Verify that the number shows up on that business’s website.

Job scams are easy to spot.

False: Job scams evolve just as the job market changes. The author points out that job scams increase when unemployment and uncertainty rise. The growing use of AI is currently driving this trend.  

How to stay safe: Read articles like this about job scams. In addition, check out the Better Business Bureau’s Scam Tracker, which catalogs over 34,000 scams. The BBB is working closely with the FBI to identify scammers.

Legitimate companies won’t ask for personal or financial information.

Legitimate companies don't ask for personal information upfrontTrue: Legitimate companies don’t ask for personal information upfront as a candidate. Once hired, your personal information, such as your social security number or bank account, is necessary, but not before you are hired. Moreover, the BBB states you should be especially wary if someone pressures you to divulge your information, saying the job offer will only last if you fill out all the forms.

How to stay safe: Follow your instincts. Never give sensitive information to anyone you aren’t sure you can trust. Does something seem “a little off?” If that is the case, disconnect and report the crime to the FBI’s ic3.gov or the FTC. You should also contact the job board if that’s where you encountered the scam. Most job sites have a mechanism for reporting these types of issues.

Additionally, Dyson says you must contact the appropriate institutions (bank, credit card, etc.) if you have given up your personal information, cash, or both.

Once scammed, you’ll know how not to get scammed again.

False: No matter how tech-savvy you may be, you are still vulnerable to social engineering tactics. You can be a victim more than once. Different scams can look the same. The bad guys take advantage of job seekers who are desperate and anxious; others are curious due to the “desirable” opportunity they seek.

How to stay safe: You must do your due diligence and research every part of your job search to ensure the opportunity is legitimate. Research the person who contacted you. Look them up. A quick LinkedIn search should reveal if they work for the company they claim to represent. Additionally, you can find the company’s contact information on their official website (check the URL) and contact them directly to ask if they are hiring for the position you’re applying for. You can go even further and verify the website at ICANN here. If they say they’ve been in business for five years, but the website was created a week ago, that is a huge red flag for a job scam.

Once scammed, there’s nothing more to do.

your personal information is their end gameFalse: Once you’re an online scam victim, the work is just beginning. The scammers may have gotten away with some money, but your personal information is their end game. They want to steal your identity and cause damage to YOUR NAME:

They can use your personal info to:

  • Get bank accounts.
  • Open Credit cards.
  • Incur Medical care resulting in medical bills.
  • Apply to multiple jobs in the same company.
  • Scam other people.

How to stay safe: Start before they scam you. Be proactive and protect your personal information. The author suggests you:

  • Regularly change your passwords.
  • Freeze your credit and bank accounts and credit reports.

Furthermore, if you fall victim to a scam, tell your network. The scammers can create social media accounts to scam others in your name.

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Can You Identify AI Images? Find Out Now!

Can You Identify AI Images? Find Out Now!Artificial Intelligence (AI) is the tech-du jour.  A significant 77% of consumers have already interacted with AI platforms in their daily lives. Nevertheless, when distinguishing between machine-generated images and real ones, only 40% of people are successful. Although some images are straightforward, prepare to be amazed by how realistic AI-generated images can be—or how peculiar real-life photos can appear. To test your AI acumen, Microsoft has designed a quiz. Can you accurately identify AI-generated images from real ones?

Real or Not quiz

SpidermanThe Real or Not quiz features fifteen distinct photos curated by Brad Smith, Microsoft’s Vice Chair and president. To begin with, your task is to determine whether each image is machine-generated or a genuine photograph. Furthermore, the quiz dynamically selects different images for each attempt, allowing you to test your AI senses continually.

My repeated attempts at the quiz yielded no straightforward answers. The BOT’s ability to produce convincing images is impressive. My highest score was 11 out of 15, achieving a commendable 73%. Finally, the results also provide context by comparing your score to other Real or Not participants. You can also include your scores at the bottom of this to see how you score compared to other Bach Seat readers.

Clues to AI

When examining images, watch for subtle clues that reveal whether they are AI-generated or authentic. While the expert AI excels at creating overall authentic scenes, scrutinizing finer details often reveals peculiarities.

AI Yoga Fail Pay attention to:

  • Doors merging.
  • Ladders that lead to nowhere.
  • Heavy machinery that is oddly placed and appears pristine.

Consider the eyes: Are they natural or flat? As for hands, AI still struggles. While improvements have been made, odd-looking fingers persist in AI images. Conversely, complex hand gestures or positions often indicate real photos.

rb-

These Artificial Intelligence-generated images pose a significant threat in political and cultural contexts. Any user can fabricate compromising images of public figures. This underscores the importance of vigilant scrutiny. Those who mindlessly doom scrolling may miss the subtle clues that reveal the true nature of the images they encounter.

Remember, as AI technology continues to evolve, our ability to discern between real and AI-generated content becomes even more critical. Stay curious, stay informed, and always question what you see online. 

Take the Microsoft Artificial Intelligence quiz and post your results here.

View Results

Loading ... Loading ...

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.